SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
Forced repetitions over alphabet lists
Neerja Mhaskar and Michael Soltys
PSC 2016
August 31, 2016
Forced - Mhaskar & Soltys PSC 2016 Title - 1/19
Thank you Franya Franek for presenting for us at PSC2015
Logical foundations of String Algorithms — a formalization
Forced - Mhaskar & Soltys PSC 2016 Title - 2/19
Summary
Thue’s 1906 problem: construct word of arbitrary length over
a ternary alphabet without repetitions.
Grytczuk in 2010 asked if the same holds true over an
alphabet list. Showed the answer is “yes” over alphabet lists
where each alphabet has at least 4 symbols.
Problem still open for alphabet lists with 3 symbols per
alphabet. We show lots of partial results.
Forced - Mhaskar & Soltys PSC 2016 Summary - 3/19
Thue’s problem and solution
Σ3 = {1, 2, 3}
morphism:
S =



1 → 12312
2 → 131232
3 → 1323132
(1)
Given a string w ∈ Σ∗
3, we let S(w) denote w with every symbol
replaced by its corresponding substitution:
S(w) = S(w1w2 . . . wn) = S(w1)S(w2) . . . S(wn).
Forced - Mhaskar & Soltys PSC 2016 Thue’s problem - 4/19
Grytczuk’s problem
Let:
L = L1, L2, . . . , Ln ,
be an ordered list of (finite) alphabets.
We say that w is a string over the list L if w = w1w2 . . . wn where
for all i, wi ∈ Li .
We impose no conditions on the Li ’s: they may be equal, disjoint,
or have elements in common.
The only condition on w is that the i-th symbol of w must be
selected from the i-th alphabet, i.e., wi ∈ Li .
Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 5/19
If |Li | ≥ 4, then no matter what the list is, there is always a
squre-free string over such a list.
This can be shown with a probabilistic algorithm:
in its i-th iteration, it selects randomly a symbol from Li ,
and continues if the string created thus far is square-free,
and otherwise deletes the suffix consisting of the right
side of the square it just created, and restarts from the
appropriate position.
Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 6/19
Grytczuk proves by a simple counting argument that with positive
probability the length of a constructed sequence exceeds any finite
bound, provided the number of symbols is at least 4.
⇒ This implies the existence of arbitrarily long square-free strings.
Note that this argument is non-constructive (or rather, it yields an
exponential time procedure).
Thus it is a weaker result than the method employed in Thue’s
original problem.
This approach relies on Moser’s algorithmic proof of Lov´asz Local
Lemma: the entropy compression argument.
Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 7/19
Open Problem 1:
Is there a polytime procedure for computing a square-free string
from a given list of lenght n?
Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 8/19
List of 3 symbol alphabets
L = L1, L2, . . . , Ln, where |Li | = 3.
We can prove it for restricted types of such lists:
L has an SDR (System of Distinct Representatives)
L has the union property
L has a consistent mapping (testing for one is NP-hard)
L is a partition
Forced - Mhaskar & Soltys PSC 2016 Our results - 9/19
Offending suffix pattern
Let C(n), an offending suffix, be a pattern defined recursively:
C(1) = X1a1X1, and for n > 1,
C(n) = XnC(n − 1)anXnC(n − 1).
Zimin words . . . !
Forced - Mhaskar & Soltys PSC 2016 Our results - 10/19
We are interested in:
C(3) = X3X2X1a1X1a2X2X1a1X1a3X3X2X1a1X1a2X2X1a1X1,
Cs(3) = a1a2a1a3a1a2a1,
and observe that Cs(3)ai , for i = 1, 2, 3, all map to strings with
squares.
Forced - Mhaskar & Soltys PSC 2016 Our results - 11/19
Result
If w is a square-free string over L = L1, L2, . . . , Ln−1, then
Ln = {a, b, c} forces a square iff w has suffix C(3).
The proof of this result is most of the PSC2016 paper.
⇐ direction is trivial
Forced - Mhaskar & Soltys PSC 2016 Our results - 12/19
⇒ As all three squares tata, ubub, vcvc are suffixes of the string
w, it follows that t, u, v must be of different sizes, and so we can
order them without loss of generality as follows:
|tat| < |ubu| < |vcv|.
We now consider different cases of the overlap of tat, ubu, vcv,
showing in each case that the resulting string has a suffix
conforming to the pattern C(3).
Forced - Mhaskar & Soltys PSC 2016 Our results - 13/19
For instance:
v = pubu, where p is a proper non-empty prefix of v.
Since w is square-free, we assume that pubu has no square, and
therefore p = u and p = b.
From this, we get vcv = pubucpubu. Therefore, this case is
possible.
ubup
v c v
Forced - Mhaskar & Soltys PSC 2016 Our results - 14/19
Open Problem 2:
Show that for any L = L1, L2, . . . , Ln, where |Li | = 3, there always
exists a square-free w over L.
Problem: very difficult to run meaningful simulations, as the
number of cases jumps up very quickly.
Hope: can we use our offending suffix characterization to do a
counting argument?
Forced - Mhaskar & Soltys PSC 2016 Conclusion - 15/19
Open Problem 3:
Map L = i Li → [n] where n = | i Li |.
Let ML = (mij ) where mij = 1 ⇐⇒ j ∈ Li .
So each row if ML will have 3 1s.
Problem: given any such matrix, can we select a single 1 from
each row in such a way that there are no 2k consecutive rows,
where the initial k rows equal the next k rows.
How to run these simulations for n > 10?
Forced - Mhaskar & Soltys PSC 2016 0-1 Matrices - 16/19
Crossing sequences
A clever technique in complexity to show:
Palindromes require Θ(n2) steps on a single tape Turing
machine.
If a language requires less then o(log log n) memory to be
decided it is in fact regular: “miniscule memory = no
memory.”
We use this to show that we can always avoid very large
repetitions (1/c, c ∈ N) over any list.
Forced - Mhaskar & Soltys PSC 2016 Crossing - 17/19
Perl
Truly sophisticated text manipulation libraries.
CGI.pm is a Perl module for CGI web applications — the workhorse
of the Internet.
The text processing is done with state of the art algorithms from
. . . 1970s
The advances in String Algorithms should be reflected in popular
implementations.
Forced - Mhaskar & Soltys PSC 2016 Conclusion - 18/19
Please visit:
http://soltys.cs.csuci.edu
and/or email us to discuss this further:
michael.soltys@csuci.edu
pophlin@mcmaster.ca
Forced - Mhaskar & Soltys PSC 2016 Conclusion - 19/19

Weitere ähnliche Inhalte

Was ist angesagt?

February 17, 2015
February 17, 2015February 17, 2015
February 17, 2015
khyps13
 
MATRICES
MATRICESMATRICES
MATRICES
daferro
 
Parallel & Perpendicular Lines
Parallel & Perpendicular LinesParallel & Perpendicular Lines
Parallel & Perpendicular Lines
chrystal_brinson
 
G6 m3-a-lesson 6-t
G6 m3-a-lesson 6-tG6 m3-a-lesson 6-t
G6 m3-a-lesson 6-t
mlabuski
 
Linear function and slopes of a line
Linear function and slopes of a lineLinear function and slopes of a line
Linear function and slopes of a line
Jerlyn Fernandez
 
Chapter 5 Slopes of Parallel and Perpendicular Lines
Chapter 5 Slopes of Parallel and Perpendicular LinesChapter 5 Slopes of Parallel and Perpendicular Lines
Chapter 5 Slopes of Parallel and Perpendicular Lines
Iinternational Program School
 
5007 Expert Voices Jered Bright
5007 Expert Voices Jered Bright5007 Expert Voices Jered Bright
5007 Expert Voices Jered Bright
brigh042
 
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
Kasun Ranga Wijeweera
 

Was ist angesagt? (20)

Vector space
Vector spaceVector space
Vector space
 
February 17, 2015
February 17, 2015February 17, 2015
February 17, 2015
 
Math10 q1 week2.arithmetic sequence1
Math10 q1 week2.arithmetic sequence1Math10 q1 week2.arithmetic sequence1
Math10 q1 week2.arithmetic sequence1
 
Writing linear equations
Writing linear equationsWriting linear equations
Writing linear equations
 
TOC 3 | Different Operations on DFA
TOC 3 | Different Operations on DFATOC 3 | Different Operations on DFA
TOC 3 | Different Operations on DFA
 
How to solve recurrence equation
How to solve recurrence equationHow to solve recurrence equation
How to solve recurrence equation
 
Vector Space & Sub Space Presentation
Vector Space & Sub Space PresentationVector Space & Sub Space Presentation
Vector Space & Sub Space Presentation
 
Vector spaces
Vector spaces Vector spaces
Vector spaces
 
Distance of a point from a line
Distance of a point from a lineDistance of a point from a line
Distance of a point from a line
 
MATRICES
MATRICESMATRICES
MATRICES
 
matricesMrtices
matricesMrticesmatricesMrtices
matricesMrtices
 
Parallel lines and perpendicular lines
Parallel lines and perpendicular linesParallel lines and perpendicular lines
Parallel lines and perpendicular lines
 
Parallel & Perpendicular Lines
Parallel & Perpendicular LinesParallel & Perpendicular Lines
Parallel & Perpendicular Lines
 
G6 m3-a-lesson 6-t
G6 m3-a-lesson 6-tG6 m3-a-lesson 6-t
G6 m3-a-lesson 6-t
 
February 16 2016
February 16 2016February 16 2016
February 16 2016
 
Linear function and slopes of a line
Linear function and slopes of a lineLinear function and slopes of a line
Linear function and slopes of a line
 
Chapter 5 Slopes of Parallel and Perpendicular Lines
Chapter 5 Slopes of Parallel and Perpendicular LinesChapter 5 Slopes of Parallel and Perpendicular Lines
Chapter 5 Slopes of Parallel and Perpendicular Lines
 
5007 Expert Voices Jered Bright
5007 Expert Voices Jered Bright5007 Expert Voices Jered Bright
5007 Expert Voices Jered Bright
 
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
Convex Partitioning of a Polygon into Smaller Number of Pieces with Lowest Me...
 
Linear inequalities in two variables
Linear inequalities in two variablesLinear inequalities in two variables
Linear inequalities in two variables
 

Andere mochten auch

Types of overload techniques
Types of overload techniquesTypes of overload techniques
Types of overload techniques
THACHR15
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
Michael Soltys
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
Michael Soltys
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
Michael Soltys
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
Michael Soltys
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
Michael Soltys
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
Michael Soltys
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
Michael Soltys
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Michael Soltys
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
Michael Soltys
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
Michael Soltys
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Michael Soltys
 

Andere mochten auch (20)

post exhaustion training
post exhaustion trainingpost exhaustion training
post exhaustion training
 
Types of overload techniques
Types of overload techniquesTypes of overload techniques
Types of overload techniques
 
Overload Techniques PDHPE
Overload Techniques PDHPEOverload Techniques PDHPE
Overload Techniques PDHPE
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
 
A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer Science
 
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
Feasible proofs of matrix identities with csanky's algorithm - CSL 2005
 

Ähnlich wie Forced repetitions over alphabet lists

27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
Mohamedshabana38
 
Algoritmos Greedy
Algoritmos GreedyAlgoritmos Greedy
Algoritmos Greedy
luzenith_g
 
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
Roman Elizarov
 
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
Roman Elizarov
 

Ähnlich wie Forced repetitions over alphabet lists (20)

NP completeness
NP completenessNP completeness
NP completeness
 
Markov Chain Monte Carlo Methods
Markov Chain Monte Carlo MethodsMarkov Chain Monte Carlo Methods
Markov Chain Monte Carlo Methods
 
Stochastic Process Exam Help
Stochastic Process Exam HelpStochastic Process Exam Help
Stochastic Process Exam Help
 
Results of Round 1
Results of Round 1Results of Round 1
Results of Round 1
 
Internship exam round1
Internship exam round1Internship exam round1
Internship exam round1
 
Stochastic Process Assignment Help
Stochastic Process Assignment HelpStochastic Process Assignment Help
Stochastic Process Assignment Help
 
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
27-Equivalent under modulo-27-Oct-2020Material_I_27-Oct-2020_Cryptography_.pdf
 
Algoritmos Greedy
Algoritmos GreedyAlgoritmos Greedy
Algoritmos Greedy
 
Csr2011 june14 11_00_aaronson
Csr2011 june14 11_00_aaronsonCsr2011 june14 11_00_aaronson
Csr2011 june14 11_00_aaronson
 
Greedy Algorithms with examples' b-18298
Greedy Algorithms with examples'  b-18298Greedy Algorithms with examples'  b-18298
Greedy Algorithms with examples' b-18298
 
Monte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptxMonte Carlo Berkeley.pptx
Monte Carlo Berkeley.pptx
 
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
 
Matrix Completion Presentation
Matrix Completion PresentationMatrix Completion Presentation
Matrix Completion Presentation
 
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
 
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
A Quest for Subexponential Time Parameterized Algorithms for Planar-k-Path: F...
 
10.1.1.96.9176
10.1.1.96.917610.1.1.96.9176
10.1.1.96.9176
 
Stratified sampling and resampling for approximate Bayesian computation
Stratified sampling and resampling for approximate Bayesian computationStratified sampling and resampling for approximate Bayesian computation
Stratified sampling and resampling for approximate Bayesian computation
 
Mathematical Statistics Homework Help
Mathematical Statistics Homework HelpMathematical Statistics Homework Help
Mathematical Statistics Homework Help
 
Problemas de Smale
Problemas de SmaleProblemas de Smale
Problemas de Smale
 
Introduction
IntroductionIntroduction
Introduction
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Forced repetitions over alphabet lists

  • 1. Forced repetitions over alphabet lists Neerja Mhaskar and Michael Soltys PSC 2016 August 31, 2016 Forced - Mhaskar & Soltys PSC 2016 Title - 1/19
  • 2. Thank you Franya Franek for presenting for us at PSC2015 Logical foundations of String Algorithms — a formalization Forced - Mhaskar & Soltys PSC 2016 Title - 2/19
  • 3. Summary Thue’s 1906 problem: construct word of arbitrary length over a ternary alphabet without repetitions. Grytczuk in 2010 asked if the same holds true over an alphabet list. Showed the answer is “yes” over alphabet lists where each alphabet has at least 4 symbols. Problem still open for alphabet lists with 3 symbols per alphabet. We show lots of partial results. Forced - Mhaskar & Soltys PSC 2016 Summary - 3/19
  • 4. Thue’s problem and solution Σ3 = {1, 2, 3} morphism: S =    1 → 12312 2 → 131232 3 → 1323132 (1) Given a string w ∈ Σ∗ 3, we let S(w) denote w with every symbol replaced by its corresponding substitution: S(w) = S(w1w2 . . . wn) = S(w1)S(w2) . . . S(wn). Forced - Mhaskar & Soltys PSC 2016 Thue’s problem - 4/19
  • 5. Grytczuk’s problem Let: L = L1, L2, . . . , Ln , be an ordered list of (finite) alphabets. We say that w is a string over the list L if w = w1w2 . . . wn where for all i, wi ∈ Li . We impose no conditions on the Li ’s: they may be equal, disjoint, or have elements in common. The only condition on w is that the i-th symbol of w must be selected from the i-th alphabet, i.e., wi ∈ Li . Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 5/19
  • 6. If |Li | ≥ 4, then no matter what the list is, there is always a squre-free string over such a list. This can be shown with a probabilistic algorithm: in its i-th iteration, it selects randomly a symbol from Li , and continues if the string created thus far is square-free, and otherwise deletes the suffix consisting of the right side of the square it just created, and restarts from the appropriate position. Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 6/19
  • 7. Grytczuk proves by a simple counting argument that with positive probability the length of a constructed sequence exceeds any finite bound, provided the number of symbols is at least 4. ⇒ This implies the existence of arbitrarily long square-free strings. Note that this argument is non-constructive (or rather, it yields an exponential time procedure). Thus it is a weaker result than the method employed in Thue’s original problem. This approach relies on Moser’s algorithmic proof of Lov´asz Local Lemma: the entropy compression argument. Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 7/19
  • 8. Open Problem 1: Is there a polytime procedure for computing a square-free string from a given list of lenght n? Forced - Mhaskar & Soltys PSC 2016 Grytczuk results - 8/19
  • 9. List of 3 symbol alphabets L = L1, L2, . . . , Ln, where |Li | = 3. We can prove it for restricted types of such lists: L has an SDR (System of Distinct Representatives) L has the union property L has a consistent mapping (testing for one is NP-hard) L is a partition Forced - Mhaskar & Soltys PSC 2016 Our results - 9/19
  • 10. Offending suffix pattern Let C(n), an offending suffix, be a pattern defined recursively: C(1) = X1a1X1, and for n > 1, C(n) = XnC(n − 1)anXnC(n − 1). Zimin words . . . ! Forced - Mhaskar & Soltys PSC 2016 Our results - 10/19
  • 11. We are interested in: C(3) = X3X2X1a1X1a2X2X1a1X1a3X3X2X1a1X1a2X2X1a1X1, Cs(3) = a1a2a1a3a1a2a1, and observe that Cs(3)ai , for i = 1, 2, 3, all map to strings with squares. Forced - Mhaskar & Soltys PSC 2016 Our results - 11/19
  • 12. Result If w is a square-free string over L = L1, L2, . . . , Ln−1, then Ln = {a, b, c} forces a square iff w has suffix C(3). The proof of this result is most of the PSC2016 paper. ⇐ direction is trivial Forced - Mhaskar & Soltys PSC 2016 Our results - 12/19
  • 13. ⇒ As all three squares tata, ubub, vcvc are suffixes of the string w, it follows that t, u, v must be of different sizes, and so we can order them without loss of generality as follows: |tat| < |ubu| < |vcv|. We now consider different cases of the overlap of tat, ubu, vcv, showing in each case that the resulting string has a suffix conforming to the pattern C(3). Forced - Mhaskar & Soltys PSC 2016 Our results - 13/19
  • 14. For instance: v = pubu, where p is a proper non-empty prefix of v. Since w is square-free, we assume that pubu has no square, and therefore p = u and p = b. From this, we get vcv = pubucpubu. Therefore, this case is possible. ubup v c v Forced - Mhaskar & Soltys PSC 2016 Our results - 14/19
  • 15. Open Problem 2: Show that for any L = L1, L2, . . . , Ln, where |Li | = 3, there always exists a square-free w over L. Problem: very difficult to run meaningful simulations, as the number of cases jumps up very quickly. Hope: can we use our offending suffix characterization to do a counting argument? Forced - Mhaskar & Soltys PSC 2016 Conclusion - 15/19
  • 16. Open Problem 3: Map L = i Li → [n] where n = | i Li |. Let ML = (mij ) where mij = 1 ⇐⇒ j ∈ Li . So each row if ML will have 3 1s. Problem: given any such matrix, can we select a single 1 from each row in such a way that there are no 2k consecutive rows, where the initial k rows equal the next k rows. How to run these simulations for n > 10? Forced - Mhaskar & Soltys PSC 2016 0-1 Matrices - 16/19
  • 17. Crossing sequences A clever technique in complexity to show: Palindromes require Θ(n2) steps on a single tape Turing machine. If a language requires less then o(log log n) memory to be decided it is in fact regular: “miniscule memory = no memory.” We use this to show that we can always avoid very large repetitions (1/c, c ∈ N) over any list. Forced - Mhaskar & Soltys PSC 2016 Crossing - 17/19
  • 18. Perl Truly sophisticated text manipulation libraries. CGI.pm is a Perl module for CGI web applications — the workhorse of the Internet. The text processing is done with state of the art algorithms from . . . 1970s The advances in String Algorithms should be reflected in popular implementations. Forced - Mhaskar & Soltys PSC 2016 Conclusion - 18/19
  • 19. Please visit: http://soltys.cs.csuci.edu and/or email us to discuss this further: michael.soltys@csuci.edu pophlin@mcmaster.ca Forced - Mhaskar & Soltys PSC 2016 Conclusion - 19/19